You may not realize it, but your organization's Industrial Control Systems (ICS) environments are a target for cyber attacker. The ICS automation, process control, access control devices, system accounts and asset information all have tremendous value to attackers. This infographic demonstrates the many different ways attackers can gain access to an ICS environment and demonstrates the need for active security efforts and ICS engineer training that will enable informed engineering decision and reinforce secure behaviors when interacting with an Industrial Control System.
In many cases these are not one-off attacks, but are planned for with reconnaissance, multiple attacks and adjustment. There are campaigns that happen over the course of months, and they require system owners and operators to be vigilant and recognize when something is not right.